Please enable JavaScript to use CodeHS

Standards Mapping

for Nevada CS II

21

Standards in this Framework

16

Standards Mapped

76%

Mapped to Course

Standard Lessons
CS.1.1.2
Describe how artificial intelligence drives many software and physical systems
  1. 16.1 Magpie Lab
CS.1.1.3
Implement an artificial intelligence algorithm to play a game against a human opponent or solve a problem
  1. 16.1 Magpie Lab
CS.1.1.4
Use and adapt classic algorithms to solve computational problems
  1. 8.2 Linear Search
  2. 8.3 Binary Search
  3. 8.4 Selection Sort
  4. 8.5 Insertion Sort
  5. 8.7 Mergesort
CS.1.1.5
Develop classic algorithms in code to solve computational problems
  1. 8.2 Linear Search
  2. 8.3 Binary Search
  3. 8.4 Selection Sort
  4. 8.5 Insertion Sort
  5. 8.7 Mergesort
CS.1.2.2
Design and iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue by using events to initiate instructions
  1. 6.1 Writing BlackJack
  2. 7.1 Battleship
  3. 10.1 Final Project
  4. 14.1 Quiz Creation
  5. 18.4 Create a Negative or Positive Review
  6. 19.4 Activity 4: Extending the Celebrity Class
CS.1.3.3
Implement arrays in code
  1. 5.2 Introduction to Arrays
  2. 5.3 Using Arrays
  3. 5.4 Enhanced For Loops
CS.1.3.4
Implement ArrayLists and LinkedLists in code
  1. 5.5 ArrayList Methods
  2. 5.6 Arrays vs ArrayLists
  3. 5.8 The List Interface
CS.1.4.3
Construct solutions to problems using student-created components, such as procedures, modules and/or objects
  1. 3.1 Java Methods
  2. 3.2 Methods and Parameters
  3. 3.3 Methods and Return Values
  4. 4.4 Writing Classes
  5. 4.6 Getter and Setter Methods
  6. 7.1 Battleship
  7. 10.1 Final Project
  8. 11.1 Pokemon Simulation
  9. 12.1 Mad Libs
  10. 18.3 Autogenerated Review
  11. 18.4 Create a Negative or Positive Review
  12. 20.4 Activity 4: Hiding and Revealing a Text Message
CS.1.4.4
Analyze a large-scale computational problem and identify generalizable patterns that can be applied to a solution
  1. 6.1 Writing BlackJack
  2. 7.1 Battleship
  3. 8.6 Advanced: Recursion
  4. 20.2 Activity 2: Hiding and Revealing a Picture
  5. 20.4 Activity 4: Hiding and Revealing a Text Message
CS.1.4.5
Demonstrate code reuse by creating programming solutions using libraries and APIs
  1. 1.8 Super Karel
  2. 15.1 Elevens
  3. 16.1 Magpie Lab
  4. 17.1 Picture Lab
CS.1.5.6
Plan and develop programs for broad audiences using a software life cycle process
CS.1.5.7
Explain security issues that might lead to compromised computer programs
CS.1.5.8
Develop programs for multiple computing platforms
CS.1.5.9
Use version control systems, integrated development environments (IDEs), and collaborative tools and practices (code documentation) in a group software project
  1. 19.1 Activity 1: Introduction to Celebrity
  2. 19.2 Activity 2: The Celebrity Class: A Simple Version
  3. 19.3 Activity 3: Putting it All Together
  4. 19.4 Activity 4: Extending the Celebrity Class
CS.1.5.10
Develop and use a series of test cases to verify that a program performs according to its design specifications
  1. 1.14 More Karel Examples and Testing
CS.1.5.11
Modify an existing program to add additional functionality and discuss intended and unintended implications, e.g., breaking other functionality
  1. 16.1 Magpie Lab
  2. 17.1 Picture Lab
CS.2.2.2
Categorize the roles of operating system software
CS.2.3.2
Illustrate ways computing systems implement logic, input, and output through hardware components
CS.3.1.3
Demonstrate the ability to store bit representation of real-world phenomena, characters, numbers, and images
  1. 5.12 Binary
  2. 20.1 Activity 1: Exploring Color
  3. 20.2 Activity 2: Hiding and Revealing a Picture
  4. 20.3 Activity 3: Identifying a Hidden Picture
  5. 20.4 Activity 4: Hiding and Revealing a Text Message
CS.4.1.5
Evaluate computational artifacts to maximize their beneficial effects and minimize harmful effects on society
  1. 4.18 Ethical and Social Implications of Computing
CS.4.3.4
Discuss the role of ethics in emerging technologies
  1. 5.13 Ethical Issues Around Data Collection